General
-
Target
INV IFL NP 22080.doc
-
Size
1.7MB
-
Sample
211103-xvx86seec9
-
MD5
411bc60dedab2323705c49b657990d59
-
SHA1
c23e28d2fb158e8fc2f3c6179702e2a980b29b54
-
SHA256
600bf146efa51b38dceb6271a44fc4cc9bc115d280ef01700305a34b39581b17
-
SHA512
7e5a322da1340f5da09dd6ba52fb455b1ac70b4a0e9e285b2ed37ae399e9d1991b6fd290413d9810dda28f6313b403ec751ee240f045745435af55ffbf84e23f
Static task
static1
Behavioral task
behavioral1
Sample
INV IFL NP 22080.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
INV IFL NP 22080.doc
Resource
win10-en-20210920
Malware Config
Extracted
formbook
4.1
jy0b
http://www.filecrev.com/jy0b/
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
Targets
-
-
Target
INV IFL NP 22080.doc
-
Size
1.7MB
-
MD5
411bc60dedab2323705c49b657990d59
-
SHA1
c23e28d2fb158e8fc2f3c6179702e2a980b29b54
-
SHA256
600bf146efa51b38dceb6271a44fc4cc9bc115d280ef01700305a34b39581b17
-
SHA512
7e5a322da1340f5da09dd6ba52fb455b1ac70b4a0e9e285b2ed37ae399e9d1991b6fd290413d9810dda28f6313b403ec751ee240f045745435af55ffbf84e23f
-
Formbook Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-